Data Center Fabric Manager Professional User Manual v10.3.X (53-1001355-01, November 2009)

DCFM Professional User Manual xiii
53-1001355-01
Contents
LLDP-DCBX configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .291
Adding an LLDP profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .292
Editing an LLDP profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .293
Deleting an LLDP profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .293
Duplicating an LLDP profile. . . . . . . . . . . . . . . . . . . . . . . . . . . .294
Assigning an LLDP profile to a port or ports in a LAG . . . . . . .295
Access Control List configuration. . . . . . . . . . . . . . . . . . . . . . . . . . .296
Adding an ACL to a switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . .296
Editing the parameters of an ACL . . . . . . . . . . . . . . . . . . . . . . .299
Deleting an ACL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .299
Duplicating an ACL profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . .300
Assigning an ACL to a port or link aggregation group . . . . . . .301
Spanning Tree Protocol configuration . . . . . . . . . . . . . . . . . . . . . . .302
Enabling Spanning Tree Protocol . . . . . . . . . . . . . . . . . . . . . . .302
Setting Spanning Tree parameters for a switch. . . . . . . . . . . .303
STP configurable parameters at the port or LAG level . . . . . .306
802.1x authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .307
Enabling 802.1x authentication . . . . . . . . . . . . . . . . . . . . . . . .307
Disabling 802.1x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .308
Setting 802.1x parameters for a port. . . . . . . . . . . . . . . . . . . .308
Virtual FCoE port configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . .310
Viewing virtual FCoE ports. . . . . . . . . . . . . . . . . . . . . . . . . . . . .310
Clearing a stale entry. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .311
Chapter 12 Encryption configuration
In this chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .313
Gathering information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .314
Encryption user privileges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .315
Encryption Center features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316
Smart card usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .316
Registering authentication cards from a card reader . . . . . . . 317
Registering authentication cards from the database . . . . . . .318
De-registering an authentication card . . . . . . . . . . . . . . . . . . .318
Using authentication cards . . . . . . . . . . . . . . . . . . . . . . . . . . . .318
Registering system cards from a card reader . . . . . . . . . . . . .319
De-registering a system card. . . . . . . . . . . . . . . . . . . . . . . . . . .319
Enabling or disabling the system card requirement . . . . . . . .320
Viewing and editing switch encryption properties . . . . . . . . . . . . .320
Saving the public key certificate . . . . . . . . . . . . . . . . . . . . . . . .323
Enabling the encryption engine state. . . . . . . . . . . . . . . . . . . .323
Disabling the encryption engine state . . . . . . . . . . . . . . . . . . .323